OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Consensus-based mutual authentication scheme for Industrial IoT
Ali Haj-Hassan, Youcef Imine, Antoine Gallais, et al.
Ad Hoc Networks (2023) Vol. 145, pp. 103162-103162
Closed Access | Times Cited: 11

Showing 11 citing articles:

DeMiRaR-6T: A new defense method for detecting and mitigating rank attacks in RPL-based 6TiSCH networks
Hakan Aydın, Burak Aydın, Sedat Görmüş
Internet of Things (2025), pp. 101582-101582
Closed Access

Key Distribution and Authentication Protocols in Wireless Sensor Networks: A Survey
Sabina Szymoniak
ACM Computing Surveys (2023) Vol. 56, Iss. 6, pp. 1-31
Closed Access | Times Cited: 8

Detecting malicious proxy nodes during IoT network joining phase
Ali Haj-Hassan, Youcef Imine, Antoine Gallais, et al.
Computer Networks (2024) Vol. 243, pp. 110308-110308
Closed Access | Times Cited: 2

A Decentralized Proxy-JRC Authentication System for Scalable IETF 6TiSCH Networks
Hakan Aydın, Sedat Görmüş, Burak Aydın
IEEE Access (2024) Vol. 12, pp. 90952-90970
Open Access | Times Cited: 2

Lightweight Three-Factor Sensor and User Authentication for RPL-Based 6TiSCH Networks
Hakan Aydın, Burak Aydın, Sedat Görmüş
IEEE Sensors Journal (2024) Vol. 24, Iss. 17, pp. 28196-28209
Closed Access | Times Cited: 2

A puf-based three-party authentication key establishment scheme for fog-enabled smart home
Huan Yang, Guo Ya-jun, Yimin Guo
Pervasive and Mobile Computing (2023) Vol. 95, pp. 101843-101843
Closed Access | Times Cited: 5

Authentication schemes in wireless internet of things sensor networks: a survey and comparison
Pendukeni Phalaagae, Adamu Murtala Zungeru, Boyce Sigweni, et al.
Indonesian Journal of Electrical Engineering and Computer Science (2024) Vol. 33, Iss. 3, pp. 1876-1876
Open Access

6TiSCH IIoT Network: A Review
Yan Zhang, Haopeng Huang, Qingqing Huang, et al.
Computer Networks (2024), pp. 110759-110759
Closed Access

Decentralized Group Authentication of Devices Based on PhysicallyUnclonable Functions Using OneM2MArchitecture
Pareena Saini, Nitish Mahajan, Sakshi Kaushal, et al.
2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT) (2023)
Closed Access

Detecting Malicious Proxy Nodes During IoT Network Joining Phase
Ali Haj-Hassan, Youcef Imine, Antoine Gallais, et al.
(2023)
Closed Access

Enhancing Security in Industrial IoT: A Taxonomy-driven Approach to Risk Assessment
Muna Al-Hawawreh, Robin Doss
(2023), pp. 434-443
Closed Access

Page 1

Scroll to top